O'Reilly Emerging Technology Conference 2005
Books Safari Bookshelf Conferences O'Reilly Network
   


Arrow Home
Arrow Invitation
Arrow Registration
Arrow Speakers
Arrow Program Overview
Arrow Tutorials
Arrow Sessions
Arrow Events
Arrow BOFs
Arrow Wiki
Arrow Exhibitors
Arrow Sponsors
Arrow Hotel/Travel
Arrow See & Do
Arrow Press
Arrow Mail List

Butterfly.

Session

Trust Me: Adventures in Social Engineering
Jon Oliver, Director of Research, MailFrontier

Date: Thursday, March 17
Time: 11:45am - 12:30pm
Location: California Ballroom A

Security is all about trust. Fancy security systems are a total waste if users give away the keys to the store. According to a BBC story earlier this year, a recent survey found that when briefly questioned in-person, 79% of people unwittingly gave away information that could be used to steal their identity. In today's technology-driven world, social engineering is about getting people to give you their passwords or private information to gain access to systems and accounts.

No longer the random phone call or dumpster diving, social engineering has moved online as phishing--tricking people into providing passwords or credit card numbers with legitimate looking emails from banks, retailers, etc. While consumers are more aware of these tactics, criminals are using more sophisticated technologies to build trust and achieve success. Approximately 90% of people recently surveyed mistakenly trusted phishing emails.

How is social engineering evolving and who is the perpetrator? Attacks online are more targeted and sophisticated, and even the perpetrators aren't all they appear to be. While criminals make up the bulk of people using social engineering online, even grassroots groups are adopting social engineering practices to support their causes. Electronic zombie armies can also be enlisted to fuel social engineering efforts.

The presentation covers how social engineering tactics are used and how online communities can help defend against evolving strategies. Learn how the consumer psyche is being exploited, and by whom.



O'Reilly Home | Privacy Policy

© 2005, O'Reilly Media, Inc.